# Tests RISC-V relocations. We provide a .debug_info section with multiple
# DW_AT_high_pc entries (that's one of the attributes for which relocations are
# resolved by llvm-dwarfdump) and we add a relocation for each of them.
#
# RUN: yaml2obj %s | llvm-dwarfdump - | FileCheck %s
# To add more tests you need to modify the Content of the .debug_abbrev and
# .debug_info sections. To do that create a test.s which matches the assembly
# code below, run the command that follows and copy over the "Content" value of
# the respective sections:
#
# ```
# $ cat test.s
# .section .debug_abbrev,"",@progbits
# .byte 1 # Abbreviation Code
# .byte 0x11 # DW_TAG_compile_unit
# .byte 0 # DW_CHILDREN_no
#
# # Add a DW_AT_high_pc for each relocation we test.
# .rept 14 # (UPDATE HERE)
# .byte 0x12 # DW_AT_high_pc
# .byte 0x01 # DW_FORM_addr
# .endr
#
# .byte 0 # EOM(1)
# .byte 0 # EOM(2)
# .byte 0 # EOM(3)
#
# .section .debug_info,"",@progbits
# .4byte 2+4+1+1+8*14 # Length of Unit (UPDATE HERE)
# .2byte 4 # DWARF version number
# .4byte .debug_abbrev # Offset Into Abbrev. Section
# .byte 8 # Address Size (in bytes)
# .byte 1 # Abbrev 1
# .8byte 0x00000000000042 # Test 1
# .8byte 0x00000000000042 # Test 2
# .8byte 0x00000000000042 # Test 3
# .8byte 0x00000000000042 # Test 4
# .8byte 0x00000000000042 # Test 5
# .8byte 0x00000000000042 # Test 6
# .8byte 0x00000000000042 # Test 7
# .8byte 0x00000000000042 # Test 8
# .8byte 0x00000000004242 # Test 9
# .8byte 0x00000000004242 # Test 10
# .8byte 0x00000042424242 # Test 11
# .8byte 0x00000042424242 # Test 12
# .8byte 0x42424242424242 # Test 13
# .8byte 0x42424242424242 # Test 14
# $ llvm-mc test.s -filetype obj -triple riscv64 -o - | obj2yaml
# ```
---
FileHeader:
Class: ELFCLASS64
Data: ELFDATA2LSB
Type: ET_REL
Machine: EM_RISCV
Sections:
- Name: .debug_abbrev
Type: SHT_PROGBITS
Content: 01110012011201120112011201120112011201120112011201120112011201000000
- Name: .debug_info
Type: SHT_PROGBITS
Content: 78000000040000000000080142000000000000004200000000000000420000000000000042000000000000004200000000000000420000000000000042000000000000004200000000000000424200000000000042420000000000004242424200000000424242420000000042424242424242004242424242424200
- Name: .rela.debug_info
Type: SHT_RELA
Flags:
Link: .symtab
EntSize: 0x0000000000000018
Info: .debug_info
Relocations:
# Test 1
# 0x42 with R_RISCV_NONE(0x1) = 0x42
# CHECK: DW_AT_high_pc (0x0000000000000042)
- Offset: 0x000000000000000C # 0xC + 8*0
Symbol: v1
Type: R_RISCV_NONE
# Test 2
# 0x42 with R_RISCV_32(0xFFFFFFFFFFFFFFFF) = 0x00000000FFFFFFFF
# CHECK-NEXT: DW_AT_high_pc (0x00000000ffffffff)
- Offset: 0x0000000000000014 # 0xC + 8*1
Symbol: vFFFFFFFFFFFFFFFF
Type: R_RISCV_32
# Test 3
# 0x42 with R_RISCV_32_PCREL(0x4) = 0x4-0x1C = 0x00000000FFFFFFE8
# CHECK-NEXT: DW_AT_high_pc (0x00000000ffffffe8)
- Offset: 0x000000000000001C # 0xC + 8*2
Symbol: v4
Type: R_RISCV_32_PCREL
# Test 4
# 0x42 with R_RISCV_64(0xFFFFFFFFFFFFFFFF) = 0xFFFFFFFFFFFFFFFF
# CHECK-NEXT: DW_AT_high_pc (0xffffffffffffffff)
- Offset: 0x0000000000000024 # 0xC + 8*3
Symbol: vFFFFFFFFFFFFFFFF
Type: R_RISCV_64
# Test 5
# 0x42 with R_RISCV_SET6(1) = 0x41
# CHECK-NEXT: DW_AT_high_pc (0x0000000000000041)
- Offset: 0x000000000000002C # 0xC + 8*4
Symbol: v1
Type: R_RISCV_SET6
# Test 6
# 0x42 with R_RISCV_SUB6(0x4) = 0x7E
# CHECK-NEXT: DW_AT_high_pc (0x000000000000007e)
- Offset: 0x0000000000000034 # 0xC + 8*5
Symbol: v4
Type: R_RISCV_SUB6
# Test 7
# 0x42 with R_RISCV_ADD8(0x04020103) = 0x45
# CHECK-NEXT: DW_AT_high_pc (0x0000000000000045)
- Offset: 0x000000000000003C # 0xC + 8*6
Symbol: v04020103
Type: R_RISCV_ADD8
# Test 8
# 0x42 with R_RISCV_SUB8(0x04020103) = 0x3F
# CHECK-NEXT: DW_AT_high_pc (0x000000000000003f)
- Offset: 0x0000000000000044 # 0xC + 8*7
Symbol: v04020103
Type: R_RISCV_SUB8
# Test 9
# 0x4242 with R_RISCV_ADD16(0x04020103) = 0x4345
# CHECK-NEXT: DW_AT_high_pc (0x0000000000004345)
- Offset: 0x000000000000004C # 0xC + 8*8
Symbol: v04020103
Type: R_RISCV_ADD16
# Test 10
# 0x4242 with R_RISCV_SUB16(0x04020103) = 0x413F
# CHECK-NEXT: DW_AT_high_pc (0x000000000000413f)
- Offset: 0x0000000000000054 # 0xC + 8*9
Symbol: v04020103
Type: R_RISCV_SUB16
# Test 11
# 0x42424242 with R_RISCV_ADD32(0x04020103) = 0x46444345
# CHECK-NEXT: DW_AT_high_pc (0x0000000046444345)
- Offset: 0x000000000000005C # 0xC + 8*10
Symbol: v04020103
Type: R_RISCV_ADD32
# Test 12
# 0x42424242 with R_RISCV_SUB32(0x04020103) = 0x3E40413F
# CHECK-NEXT: DW_AT_high_pc (0x000000003e40413f)
- Offset: 0x0000000000000064 # 0xC + 8*11
Symbol: v04020103
Type: R_RISCV_SUB32
# Test 13
# 0x0042424242424242 with R_RISCV_ADD64(0x0100000000000000) = 0x0142424242424242
# CHECK-NEXT: DW_AT_high_pc (0x0142424242424242)
- Offset: 0x000000000000006C # 0xC + 8*12
Symbol: v0100000000000000
Type: R_RISCV_ADD64
# Test 14
# 0x0042424242424242 with R_RISCV_SUB64(0x0100000000000000) = 0xFF42424242424242
# CHECK-NEXT: DW_AT_high_pc (0xff42424242424242)
- Offset: 0x0000000000000074 # 0xC + 8*13
Symbol: v0100000000000000
Type: R_RISCV_SUB64
Symbols:
- Name: v1
Type: STT_SECTION
Section: .debug_info
Value: 0x0000000000000001
- Name: v4
Type: STT_SECTION
Section: .debug_info
Value: 0x0000000000000004
- Name: v04020103
Type: STT_SECTION
Section: .debug_info
Value: 0x0000000004020103
- Name: vFFFFFFFFFFFFFFFF
Type: STT_SECTION
Section: .debug_info
Value: 0xFFFFFFFFFFFFFFFF
- Name: v0100000000000000
Type: STT_SECTION
Section: .debug_info
Value: 0x0100000000000000
...